Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Third Party Security: Building Your Vendor Risk Program in 2025

Are you confident your vendors can withstand a cyber attack? If not, you should continuously evaluate your third-party security, especially if you’re sharing sensitive customer data across your vendor ecosystem. In this post, we break down the concepts of third-party security and provide an actionable roadmap for effectively strengthening this essential branch of cybersecurity across your organization.

Vendor Security Review: Key Components And Implementation

Your vendors are essential partners, but they could also be your organization's biggest hidden security risk. A robust vendor review process is the key to ensuring onboarded vendors align with your cybersecurity standards and don't increase your likelihood of suffering a data breach. This guide outlines everything you need to know to build a structured, repeatable, and scalable vendor security review process.

Shadow AI leak exposes data from 571 Canva Creators #ai #cybersecurity #dataleak #vendor #vendorrisk

571 Canva Creators had their personal data exposed by an unsecured Chroma database. The database, used by Russian AI startup My Jedai, contained 341 document collections. One of these collections included survey responses with emails, countries of residence, and detailed feedback on the Canva Creators program. This isn’t your typical breach. It’s the result of unsecured AI infrastructure.

Shadow AI: Managing the Security Risks of Unsanctioned AI Tools

The explosion of generative artificial intelligence tools is sparking a wave of enthusiasm in workplaces, with employees eagerly embracing new applications to boost productivity and innovation. However, this adoption often leads to a new phenomenon known as shadow AI—the use of artificial intelligence tools within an organization without explicit approval or oversight from IT and security teams. Unsanctioned use of AI creates significant (and often invisible) security blind spots.

Data Leakage and Other Risks of Insecure LlamaIndex Apps

Similar to Ollama and llama.cpp, LlamaIndex provides an application layer for connecting your data to LLMs and interacting with it through a chat interface. While LlamaIndex is an open source project like other LLM application frameworks, LlamaIndex is also a company, with a recent Series A, a commercial offering, and a more polished aesthetic than their strictly DIY counterparts.

Smarter Security Assessments: Automate, Customize, Scale

Discover how AI is transforming third-party risk management. In this update, Michelle from our Customer Success team walks through key improvements to AI-Assessments—from instant Security Profiles and smarter questionnaires to faster reporting and risk remediation. See what’s live, what’s coming next, and how your feedback is shaping the future of vendor risk. Interested in finding out more about UpGuard?

New in Breach Risk: Threat Monitoring Powered by an AI Analyst #cybersecurity #tprm #ai #security

Peter, Senior Product Marketing Manager at UpGuard, shares how our new Threat Monitoring feature helps security teams detect and triage real threats across the open, deep, and dark web—faster and with more clarity. Now in early access. Talk to your UpGuard rep to get started.

SaaS Permissions: Are Employees Granting Too Much Access?

Today, the average employee juggles dozens of SaaS apps—each requesting access with a quick click. But how many employees check whether those permissions (granted in moments to boost productivity) might be unlocking sensitive company data? While businesses thrive on the agility and collaboration SaaS tools provide, this convenience can create a frequently overlooked web of user-granted permissions.

Our AI is scanning the dark web to recover stolen credentials right now. #cybersecurity #ai #vendor

Our AI is scanning the dark web right now — here’s what it’s finding. In this cybersecurity short, we give you a real-time glimpse into how AI-driven tools are monitoring the dark web for stolen credentials, emerging threats, and malicious activity before it reaches your business. From detecting leaked passwords to identifying early signs of cyberattacks, AI is transforming threat intelligence and external attack surface management (EASM).